|
|
Line 1: |
Line 1: |
| {| class="wikitable" align="right" width=300px
| | Name: Maggie Weldon<br>My age: 32 years old<br>Country: Netherlands<br>City: Ijsselstein <br>Postal code: 3401 Gh<br>Address: Teenschillerpad 140<br><br>my website ... [http://www.180smoke.ca electronic cigarette canada] |
| |+ Timeline of key events
| |
| |-
| |
| ! Time
| |
| ! Event
| |
| |-
| |
| | September 1939
| |
| | [[World War II#War breaks out in Europe|War breaks out in Europe]].
| |
| |-
| |
| | Second half of 1940
| |
| | First non-[[Morse code|Morse]] transmissions intercepted.
| |
| |-
| |
| | June 1941
| |
| | First experimental [[Lorenz cipher|SZ40 Tunny]] link started with alphabetic [[Cryptanalysis#Indicator|indicator]].
| |
| |-
| |
| | August 1941
| |
| | Two long messages in [[Cryptanalysis#Depth|depth]] yielded almost 4000 characters of [[Key (cryptography)|key]].
| |
| |-
| |
| | January 1942
| |
| | Tunny diagnosed from key.<br> August 1941 traffic read.
| |
| |-
| |
| | July 1942
| |
| | [[Turingery]] method of wheel breaking.<br> [[Testery]] established<br> First reading of up-to-date traffic.
| |
| |-
| |
| | October 1942
| |
| | Experimental link closed.<br> First two of eventual 26 links started with QEP indicator system.
| |
| |-
| |
| | November 1942
| |
| | [[#Tutte's "1+2 break in"|"1 + 2 break in"]] invented by [[Bill Tutte]].
| |
| |-
| |
| | February 1943
| |
| | More complex SZ42A introduced.
| |
| |-
| |
| | June 1943
| |
| | [[Heath Robinson (codebreaking machine)|Heath Robinson]] delivered.<br>[[Newmanry]] established.
| |
| |-
| |
| | November 1943
| |
| | [[Colossus computer|Colossus I]] working at Dollis Hill prior to delivery to Bletchley Park.
| |
| |-
| |
| | February 1944
| |
| | First use of Colossus I for a real job.
| |
| |-
| |
| | June 1944
| |
| | D-day.<br> Colossus II working at Bletchley Park.<br> SZ42B introduced.
| |
| |-
| |
| | May 1945
| |
| | [[Victory in Europe Day|Victory in Europe]].<br> Ten Colossi in use.
| |
| |}
| |
| | |
| '''Cryptanalysis of the Lorenz cipher''' was the process that enabled the British to read high-level German army messages during [[World War II]]. The British [[Government Communications Headquarters#Government Code and Cypher School (GC&CS)|Government Code and Cypher School (GC&CS)]] at [[Bletchley Park]] decrypted many communications between the ''[[Oberkommando der Wehrmacht]]'' (OKW, German High Command) in Berlin and their army commands throughout occupied Europe, some of which were signed "Adolf Hitler, Fuhrer".<ref>{{Harvnb|McKay|2010|p=263}} quoting [[Jerry Roberts]]</ref> These were intercepted non-[[Morse code|Morse]] radio transmissions that had been enciphered by the [[Lorenz cipher|Lorenz SZ]] teletypewriter [[Rotor machine|rotor]] [[stream cipher]] attachments. Decrypts of this traffic became an important source of "[[Ultra]]" intelligence.<ref>{{Harvnb|Hinsley|1993|p=8}}</ref>
| |
| | |
| For its high-level secret messages, the German armed services enciphered each [[Character (computing)|character]] using various online ''Geheimschreiber'' (secret writer) stream cipher machines at both ends of a telegraph link using the [[bit|5-bit]] [[Baudot code#ITA2|International Telegraphy Alphabet No. 2]] (ITA2). These machines were the Lorenz SZ (SZ for ''Schlüsselzusatz'', meaning "cipher attachment") machine for the army, the [[Siemens and Halske T52]] for the air force and the Siemens T43, which was little used and never broken by the Allies.<ref>{{Harvnb|Weierud|2006|p=307}}</ref><ref>{{Harvnb|Good|Michie|Timms|1945|p=5}} in ''1. Introduction: German Tunny''</ref>
| |
| | |
| Bletchley Park decrypts of messages enciphered with the [[Enigma machine]]s revealed that the Germans called one of their wireless teleprinter transmission systems ''"Sägefisch"'' (sawfish), which led British [[cryptographer]]s to refer to encrypted German [[Electrical telegraph|teleprinter]] traffic as "[[Fish (cryptography)|Fish]]".<ref>{{Harvnb|Hinsley|1993|pp=141–142}}</ref> "'''Tunny'''" was the name given to the first non-Morse link, and it was subsequently used for the Lorenz SZ machines and the traffic enciphered by them.<ref>{{Harvnb|Gannon|2007|p=189}}</ref>
| |
| | |
| As with the entirely separate [[Cryptanalysis of the Enigma]], it was German operational shortcomings that allowed the initial diagnosis of the system, and a way into decryption.<ref>{{Harvnb|Copeland|2006|p=45}}</ref> Unlike Enigma, no physical machine reached [[Allies of World War II|allied]] hands until the very end of the war in Europe, long after wholesale decryption had been established.<ref>{{Harvnb|Good|1993|pp=162,163}}</ref> Initially, operator errors produced a number of pairs of transmissions sent with the same [[Key (cryptography)|keys]], giving a [[Cryptanalysis#Depth|"depth"]], which often allowed manual decryption to be achieved. One long depth also allowed the complete logical structure of the machine to be worked out, a quite remarkable cryptanalytical feat on which the subsequent comprehensive decrypting of Tunny messages relied.<ref>{{Harvnb|Tutte|1998|pp=5, 6}}</ref>
| |
| | |
| When depths became less frequent, decryption was achieved by a combination of manual and automated methods. The first machine to automate part of the decrypting process was called "[[Heath Robinson (codebreaking machine)|Heath Robinson]]" and it was followed by several other "Robinsons". These were, however, slow and unreliable, and were supplemented by the much faster and flexible "[[Colossus computer|Colossus]]" the world's first electronic, programmable digital computer, ten of which were in use by the end of the war.<ref>{{Harvnb|Flowers|2006|p=81}}</ref><ref>All but two of the Colossus computers, which were taken to [[GCHQ]], were destroyed in 1945, and the whole project was kept strictly secret until the 1970s. Thus Colossus did not feature in many early descriptions of the development of electronic computers. {{Harvnb|Gannon|2006|p=431}}</ref>
| |
| | |
| Albert W. Small, an American cryptographer from the [[Signal Corps (United States Army)|US Signal Corps]] who was seconded to Bletchley Park and worked on Tunny, said in his December 1944 report back to [[Arlington Hall]] that:
| |
| {{blockquote|Daily solutions of Fish messages at GC&CS reflect a background of British mathematical genius, superb engineering ability, and solid common sense. Each of these has been a necessary factor. Each could have been overemphasised or underemphasised to the detriment of the solutions; a remarkable fact is that the fusion of the elements has been apparently in perfect proportion. The result is an outstanding contribution to cryptanalytic science.<ref>{{Harvnb|Small|1944|p=1}}</ref>}}
| |
| | |
| ==The German Tunny machines==
| |
| {{See also|Lorenz cipher}}
| |
| [[Image:SZ42-6-wheels-lightened.jpg|right|340px|thumbnail|The Lorenz SZ machines had 12 wheels each with a different number of cams (or "pins").
| |
| {|class="wikitable" | border=1 | style="margin: 1em auto 1em auto"
| |
| |-
| |
| ! Wheel number
| |
| |1||2||3||4||5||6||7||8||9||10||11||12
| |
| |-
| |
| ! BP wheel name<ref name = "GRoT11B6">{{Harvnb|Good|Michie|Timms|1945|p=6}} in ''1. Introduction: German Tunny''</ref>
| |
| | align="center" | <math>\psi</math><sub>1</sub>
| |
| | align="center" | <math>\psi</math><sub>2</sub>
| |
| | align="center" | <math>\psi</math><sub>3</sub>
| |
| | align="center" | <math>\psi</math><sub>4</sub>
| |
| | align="center" | <math>\psi</math><sub>5</sub>
| |
| | align="center" | <math>\mu</math>37
| |
| | align="center" | <math>\mu</math>61
| |
| | align="center" | <math>\chi</math><sub>1</sub>
| |
| | align="center" | <math>\chi</math><sub>2</sub>
| |
| | align="center" | <math>\chi</math><sub>3</sub>
| |
| | align="center" | <math>\chi</math><sub>4</sub>
| |
| | align="center" | <math>\chi</math><sub>5</sub>
| |
| |-
| |
| ! Number of cams (pins)
| |
| |43||47||51||53||59||37||61||41||31||29||26||23
| |
| |}
| |
| ]]
| |
| | |
| The Lorenz SZ cipher attachments implemented a [[Gilbert Vernam#The Vernam cipher|Vernam]] [[stream cipher]], using a complex array of twelve wheels that delivered what should have been a [[Cryptographically secure pseudorandom number generator|cryptographically secure pseudorandom number]] as a [[Key (cryptography)|key]] stream. The key stream was combined with the [[plaintext]] to produce the [[ciphertext]] at the transmitting end using the [[Exclusive or|exclusive or (XOR)]] function. At the receiving end, an identically configured machine produced the same key stream which was combined with the ciphertext to produce the plaintext, i. e. the system implemented a [[symmetric-key algorithm]].
| |
| | |
| The right hand five wheels, the [[Chi (letter)|''chi'']] (<math>\chi</math>) wheels, changed the five impulses (bits) of the incoming character, advancing one position every time. The left hand five, the [[Psi (letter)|''psi'']] (<math>\psi</math>) wheels, further changed the result of the ''chi'' transform, but they did not always move on with each new character.
| |
| | |
| The central two [[Mu (letter)|''mu'']] (<math>\mu</math>) or "motor" wheels determined whether or not the ''psi'' wheels rotated with a new character.<ref>{{Harvnb|Gannon|2007|pp=150, 151}}</ref><ref>{{Harvnb|Good|1993|p=153}}</ref> The SZ42A and SZ42B machines had a more complex arrangement for advancing the ''psi'' wheels than the original SZ40.
| |
| | |
| Each wheel had a number of cams that could be set in one of two positions. The numbers of cams on the set of wheels were [[Coprime|co-prime]] with each other giving an extremely long period before the key sequence repeated. The process of working out which of the 501 cams were in the raised position was called "wheel breaking" at Bletchley Park.<ref>{{Harvnb|Good|Michie|Timms|1945|p=16}} in ''1. Introduction: Cryptographic Aspects''</ref> Deriving the start positions of the wheels for a particular transmission was termed "wheel setting" or simply "setting". The fact that the ''psi'' wheels all moved together, but not with every input character, was a major weakness of the machines that led to cryptanalytical success.
| |
| | |
| ==Secure Telegraphy==
| |
| {{See also|Electrical telegraph}}
| |
| [[Electromechanics|Electro-mechanical]] telegraphy was developed in the 1830s and 1840s, well before [[History of the telephone|telephony]], and was in worldwide use by the time of the [[World War II|Second World War]]. An extensive system of cables were used within and between countries, with a standard voltage of −80 V indicating a "mark" and +80 V indicating a "space".<ref>{{Harvnb|Hayward|1993|p=176}}</ref> Where cable transmission was impracticable or inconvenient, such as for mobile German Army Units, radio transmission was used.
| |
| | |
| [[Teleprinter]]s at each end of the circuit consisted of a keyboard and printing mechanism, and very often a five-hole [[Punched tape|perforated paper tape]] reading and punching mechanism. When used [[Online and offline|online]], pressing an alphabet key at the transmitting end caused the relevant character to be printed at the receiving end. Commonly, however, the [[Punched tape#Communications|communication system]] involved the transmitting operator preparing a set of messages offline by punching them onto paper tape, and then going online only for the transmission of the messages recorded on the tape. Typically this would be at some ten characters per second, and so occupy the line or radio channel for a shorter time than for online typing.
| |
| | |
| The characters of the message were represented by the codes of the International Telegraphy Alphabet No. 2 ([[Baudot code#ITA2|ITA2]]). The transmission medium, either wire or radio, used [[asynchronous serial communication]] with each character signaled by a start (space) impulse, 5 data impulses and 1½ stop (mark) impulses. At Bletchley Park mark impulses were signified by '''x''' and space impulses by '''•'''.<ref>In more recent terminology, each impulse would be termed a "[[bit]]" with a mark being binary 1 and a space being binary 0. Punched paper tape had a hole for a mark and no hole for a space.</ref> For example the letter "H" would be coded as '''••x•x'''.<ref>{{Harvnb|Copeland|2006|pp=348, 349}}</ref>
| |
| | |
| {| class="wikitable" | border=1 | style="margin: 1em auto 1em auto"
| |
| |+ Binary teleprinter code ([[Baudot code#ITA2|ITA2]]) as used at Bletchley Park, arranged in [[Gray code|reflection order]] whereby each row differs from its neighbours by only one bit.
| |
| |-
| |
| ! width="150pt"| Pattern of impulses Mark = '''x''', Space = '''•'''
| |
| ! width="100pt"| Binary
| |
| ! width="100pt"| Letter shift
| |
| ! width="100pt"| Figure shift
| |
| ! width="100pt"| BP 'shiftless' interpretation
| |
| |-
| |
| | align="center" | '''•••••''' || align="center" | 00000 || align="center" | null || align="center" | null || align="center" | /
| |
| |-
| |
| | align="center" | '''••x••''' || align="center" | 00100 || align="center" | space || align="center" | space || align="center" | 9
| |
| |-
| |
| | align="center" | '''••x•x''' || align="center" | 00101 || align="center" | H || align="center" | # || align="center" | H
| |
| |-
| |
| | align="center" | '''••••x''' || align="center" | 00001 || align="center" | T || align="center" | 5 || align="center" | T
| |
| |-
| |
| | align="center" | '''•••xx''' || align="center" | 00011 || align="center" | O || align="center" | 9 || align="center" | O
| |
| |-
| |
| | align="center" | '''••xxx''' || align="center" | 00111 || align="center" | M || align="center" | . || align="center" | M
| |
| |-
| |
| | align="center" | '''••xx•''' || align="center" | 00110 || align="center" | N || align="center" |, || align="center" | N
| |
| |-
| |
| | align="center" | '''•••x•''' || align="center" | 00010 || align="center" | CR || align="center" | CR || align="center" | 3
| |
| |-
| |
| | align="center" | '''•x•x•''' || align="center" | 01010 || align="center" | R || align="center" | 4 || align="center" | R
| |
| |-
| |
| | align="center" | '''•xxx•''' || align="center" | 01110 || align="center" | C || align="center" | : || align="center" | C
| |
| |-
| |
| | align="center" | '''•xxxx''' || align="center" | 01111 || align="center" | V || align="center" | ; || align="center" | V
| |
| |-
| |
| | align="center" | '''•x•xx''' || align="center" | 01011 || align="center" | G || align="center" | & || align="center" | G
| |
| |-
| |
| | align="center" | '''•x••x''' || align="center" | 01001 || align="center" | L || align="center" | ) || align="center" | L
| |
| |-
| |
| | align="center" | '''•xx•x''' || align="center" | 01101 || align="center" | P || align="center" | 0 || align="center" | P
| |
| |-
| |
| | align="center" | '''•xx••''' || align="center" | 01100 || align="center" | I || align="center" | 8 || align="center" | I
| |
| |-
| |
| | align="center" | '''•x•••''' || align="center" | 01000 || align="center" | LF || align="center" | LF || align="center" | 4
| |
| |-
| |
| | align="center" | '''xx•••''' || align="center" | 11000 || align="center" | A || align="center" | - || align="center" | A
| |
| |-
| |
| | align="center" | '''xxx••''' || align="center" | 11100 || align="center" | U || align="center" | 7 || align="center" | U
| |
| |-
| |
| | align="center" | '''xxx•x''' || align="center" | 11101 || align="center" | Q || align="center" | 1 || align="center" | Q
| |
| |-
| |
| | align="center" | '''xx••x''' || align="center" | 11001 || align="center" | W || align="center" | 2 || align="center" | W
| |
| |-
| |
| | align="center" | '''xx•xx''' || align="center" | 11011 || align="center" | FIGS || align="center" | || align="center" | + or 5
| |
| |-
| |
| | align="center" | '''xxxxx''' || align="center" | 11111 || align="center" | || align="center" | LTRS || align="center" | - or 8
| |
| |-
| |
| | align="center" | '''xxxx•''' || align="center" | 11110 || align="center" | K || align="center" | ( || align="center" | K
| |
| |-
| |
| | align="center" | '''xx•x•''' || align="center" | 11010 || align="center" | J || align="center" | ' || align="center" | J
| |
| |-
| |
| | align="center" | '''x••x•''' || align="center" | 10010 || align="center" | D || align="center" | $ || align="center" | D
| |
| |-
| |
| | align="center" | '''x•xx•''' || align="center" | 10110 || align="center" | F || align="center" | ! || align="center" | F
| |
| |-
| |
| | align="center" | '''x•xxx''' || align="center" | 10111 || align="center" | X || align="center" | / || align="center" | X
| |
| |-
| |
| | align="center" | '''x••xx''' || align="center" | 10011 || align="center" | B || align="center" | ? || align="center" | B
| |
| |-
| |
| | align="center" | '''x•••x''' || align="center" | 10001 || align="center" | Z || align="center" | " || align="center" | Z
| |
| |-
| |
| | align="center" | '''x•x•x''' || align="center" | 10101 || align="center" | Y || align="center" | 6 || align="center" | Y
| |
| |-
| |
| | align="center" | '''x•x••''' || align="center" | 10100 || align="center" | S || align="center" | ' || align="center" | S
| |
| |-
| |
| | align="center" | '''x••••''' || align="center" | 10000 || align="center" | E || align="center" | 3 ||align="center" | E
| |
| |}
| |
| | |
| The figure shift (FIGS) and letter shift (LETRS) characters determined how the receiving end interpreted the string of characters up to the next shift character. Because of the danger of a shift character being corrupted, some operators would type a pair of shift characters when changing from letters to numbers or ''vice versa''. So they would type 55M88 to represent a full stop.<ref>{{Harvnb|Roberts|2006|p=256}}</ref> Such doubling of characters was very helpful for the statistical cryptanalysis used at Bletchley Park. After encipherment, shift characters had no special meaning.
| |
| | |
| Unlike Morse-coded signals, a human listener could not interpret a radio telegraph message. A standard teleprinter, however would produce the text of the message. The Lorenz cipher attachment changed the [[plaintext]] of the message into [[ciphertext]] that was uninterpretable to those without an identical machine identically set up. This was the challenge faced by the Bletchley Park codebreakers.
| |
| | |
| ==Interception==
| |
| {{See also|Wireless telegraphy}}
| |
| Intercepting Tunny transmissions presented substantial problems. As the transmitters were directional, most of the signals were quite weak at receivers in Britain. Furthermore, there were some 25 different [[Radio frequency|frequencies]] used for these transmissions, and the frequency would sometimes be changed part way through. After the initial discovery of the non-Morse signals in 1940, a [[Y-stations|Y-station]] was set up on a hill at the Ivy Farm Communications Centre at [[Knockholt]] in Kent, specifically to intercept this traffic.<ref>{{Harvnb|Gannon|2007|p=125}}</ref> The centre was headed by Harold Kenworthy, had 30 receiving sets and employed some 600 staff. It became fully operational early in 1943.
| |
| [[File:Undulator Tape.jpg|right|600px|thumbnail| A length of tape, 12mm (0.5in) wide, produced by an undulator similar to those used during the Second World War for intercepted 'Tunny' wireless telegraphic traffic at Knockholt, for translation into ITA2 characters to be sent to Bletchley Park]]
| |
| Because a single missed or corrupted character could make decryption impossible, the greatest accuracy was required.<ref name = "GRoT33B281">{{Harvnb|Good|Michie|Timms|1945|p=281}} in ''3. Organisation: Knockholt''</ref> The undulator technology used to record the impulses had originally been developed for high-speed Morse. It produced a visible record of the impulses on narrow paper tape. This was then read by people employed as "slip readers" who interpreted the peaks and troughs as the marks and spaces of ITA2 characters. Perforated paper tape was then produced for telegraphic transmission to Bletchley Park where it was punched out.<ref name="WardBritishTunny">{{Harvnb|Ward|2011}}</ref>
| |
| | |
| ==The Vernam cipher==
| |
| {{main|Gilbert Vernam}}
| |
| This cipher uses the [[Boolean algebra (logic)|Boolean]] [[Exclusive or|"exclusive or" (XOR)]] function, symbolised by ⊕<ref>{{Harvnb|Klein|p=2}}</ref> and verbalised as "A or B but not both". This is represented by the following "[[truth table]]", where '''x''' represents "true" and '''•''' represents "false".
| |
| {| class="wikitable" || border=1 | style="margin: 1em auto 1em auto"
| |
| |- bgcolor="#ddeeff" align="center"
| |
| |colspan=2|'''INPUT''' || '''OUTPUT'''
| |
| |- bgcolor="#ddeeff" align="center"
| |
| | A || B || A ⊕ B
| |
| |- bgcolor="#ddffdd" align="center"
| |
| |'''•'''||'''•'''||'''•'''
| |
| |- bgcolor="#ddffdd" align="center"
| |
| |'''•'''||'''x'''||'''x'''
| |
| |- bgcolor="#ddffdd" align="center"
| |
| |'''x'''||'''•'''||'''x'''
| |
| |- bgcolor="#ddffdd" align="center"
| |
| |'''x'''||'''x'''||'''•'''
| |
| |}
| |
| Other names for this function are: Not equal (NEQ), and [[Modular arithmetic|modulo]] 2 addition (without "carry") and subtraction (without "borrow"). Note that modulo 2 addition and subtraction are identical. Some descriptions of Tunny decryption refer to addition and some to differencing, i.e. subtraction, but they mean the same thing.
| |
| | |
| A desirable feature of a machine cipher is that the same machine with the same settings can be used either for enciphering or for deciphering. The Vernam cipher achieves this reciprocity, as combining the stream of plaintext characters with the key stream produces the ciphertext, and combining the same key with the ciphertext regenerates the plaintext.
| |
| | |
| Symbolically:
| |
| | |
| ::::<big>[[Plaintext]] ⊕ [[Key (cryptography)|Key]] = [[Ciphertext]]</big>
| |
| | |
| and
| |
| | |
| ::::<big> [[Ciphertext]] ⊕ [[Key (cryptography)|Key]] = [[Plaintext]] </big>
| |
| | |
| Vernam's original idea was to use conventional telegraphy practice, with a paper tape of the plaintext combined with a paper tape of the key at the transmitting end, and an identical key tape combined with the ciphertext signal at the receiving end. Each pair of key tapes would have been unique (a one-time tape), but generating and distributing such tapes presented considerable practical difficulties. In the 1920s four men in different countries invented rotor Vernam cipher machines to produce a key stream to act instead of a key tape.<ref>{{Harvnb|Klein|p=3}}</ref> Lorenz SZ40/42 was one of these.<ref name = "GRoT11B10">{{Harvnb|Good|Michie|Timms|1945|p=10}} in ''1. Introduction: German Tunny''</ref>
| |
| | |
| ==Security Features==
| |
| | |
| [[File:English letter frequency (alphabetic).svg|right|340px|thumbnail|A typical distribution of letters in [[English language]] text. Inadequate encipherment may not sufficiently mask the non-uniform nature of the distribution. This property was exploited in cryptanalysis of the Lorenz cipher by weakening part of the key.]]
| |
| | |
| A [[monoalphabetic substitution cipher]] such as the [[Caesar cipher]] can easily be broken, given a reasonable amount of ciphertext. This is achieved by [[frequency analysis]] of the different letters of the ciphertext, and comparing the result with the known distribution of letters in the language of the plaintext. With a [[polyalphabetic cipher]], however, such as the Lorenz cipher, there is a different substitution alphabet for each successive character. So a frequency analysis shows an approximately [[Uniform distribution (discrete)|uniform distribution]], such as that obtained from a [[Cryptographically secure pseudorandom number generator|(pseudo) random number generator]]. By trying multiple putative ''chi''-component partial key streams against the ciphertext, the Bletchley Park cryptanalysts were able to detect some of the underlying non-uniformity and so identify which partial key stream was likely to be correct.
| |
| | |
| The total number of cams on the twelve wheels of the SZ machines was 501. Each cam could either be in a raised position, in which case it contributed '''x''' to the logic of the system, or in the lowered position, in which case it generated '''•'''.<ref name = "GRoT11B10"/> The total possible number of patterns of raised cams was 2<sup>501</sup> which is an astronomically large number.<ref>{{Harvnb|Churchhouse|2002|pp=158, 159}}</ref> In practice, however, about half of the cams on each wheel were in the raised position. Later, the Germans realized that if the number of raised cams was not very close to half and there were runs of '''x'''s and '''•'''s, a cryptographic weakness existed.<ref>{{Harvnb|Good|Michie|Timms|1945|p=11}} in ''1. Introduction: German Tunny''</ref><ref>This statement is an over-simplification. The real constraint is much more complex, that ab=½. See also: {{Harvnb|Good|Michie|Timms|1945|p=17}} in ''1. Introduction: Some Historical Notes'' and {{Harvnb|Good|Michie|Timms|1945|p=306}} in ''4. Early Methods and History: Early Hand Methods'' for further details.</ref> Indeed this weakness was one of the two factors that led to the system being diagnosed.
| |
| | |
| The pattern of raised and lowered cams was changed daily on the motor wheels (<math>\mu</math>37 and <math>\mu</math>61). The ''psi'' wheel patterns were changed quarterly until October 1942 when the frequency was increased to monthly, and then to daily on 1 August 1944, when the ''chi'' wheel patterns were also changed from their original monthly frequency to daily.<ref>{{Harvnb|Copeland|2006|p=48}}</ref>
| |
| | |
| The number of start positions of the wheels was 43×47×51×53×59×37×61×41×31×29×26×23 which is approximately 1.6×10<sup>19</sup>, far too large a number for cryptanalysts to try an exhaustive [[Brute-force attack|"brute-force attack"]]. As the numbers of positions of the wheels are [[Coprime|co-prime]] with each other this number is also the period before the key repeated. Sometimes the Lorenz operators disobeyed instructions and two messages were transmitted with the same start positions, a phenomenon termed a [[Cryptanalysis#Depth|"depth"]]. The method by which the transmitting operator told the receiving operator the wheel settings that he had chosen for the message which he was about to transmit was termed the [[Cryptanalysis#Indicator|"indicator"]] at Bletchley Park.
| |
| | |
| In August 1942, the stereotyped starts to the messages, which were useful to cryptanalysts, were replaced by some irrelevant text, which made identifying the true message somewhat harder. This new material was dubbed ''quatsch'' (German for "nonsense") at Bletchley Park.<ref>{{Harvnb|Edgerley|2006|pp=273, 274}}</ref>
| |
| | |
| During the phase of the experimental transmissions, the indicator consisted of twelve German forenames, the initial letters of which indicated the position to which the operators turned the twelve wheels. As well as showing when two transmissions were fully in depth, it also allowed the identification of partial depths where two indicators differed only in one or two wheel positions. From October 1942 the indicator system changed to the sending operator transmitting the unenciphered letters QEP<ref>Initially QKP (see {{Harvnb|Good|Michie|Timms|1945|p=28}} in ''3. Organisation: Expansion and Growth'') or QSN (see {{Harvnb|Good|Michie|Timms|1945|p=320}} in ''4. Early Methods and History: Hand statistical Methods'').</ref> followed by a two digit number. This number was taken serially from a code book that had been issued to both operators and gave, for each QEP number, the settings of the twelve wheels. The books were replaced when they had been used up, but between replacements, complete depths could be identified by the re-use of a QEP number on a particular Tunny link.<ref>{{Harvnb|Copeland|2006|pp=44–47}}</ref>
| |
| | |
| ==Diagnosis==
| |
| The first step in breaking a new cipher is to diagnose the logic of the processes of encryption and decryption. In the case of a machine cipher such as Tunny, this entailed establishing the logical structure and hence functioning of the machine. This was achieved without the benefit of seeing a machine—which only happened in 1945, shortly before the allied victory in Europe.<ref name=Sale>{{Citation | last = Sale | first = Tony | author-link = Anthony Sale | title = The Lorenz Cipher and how Bletchley Park broke it | url = http://www.codesandciphers.org.uk/lorenz/fish.htm | accessdate = 21 October 2010 }}</ref>
| |
| | |
| During the experimental period of Tunny transmissions when the twelve-letter indicator system was in use, [[John Tiltman]], Bletchley Park's veteran and remarkably gifted cryptanalyst, studied the Tunny ciphertexts and identified that they used a Vernam cipher.
| |
| | |
| When two transmissions ('''a''' and '''b''') use the same key, i.e. they are in depth, combining them eliminates the effect of the key.<ref>{{Harvnb|Tutte|2006|p=353}}</ref> Let us call the two ciphertexts <big>Za</big> and <big>Zb</big>, the key <big>K</big> and the two plaintexts <big>Pa</big> and <big>Pb</big>. We then have:
| |
| ::::<big> Za ⊕ Zb = Pa ⊕ Pb </big>
| |
| If the two plaintexts can be worked out, the key can be recovered from either ciphertext-plaintext pair e.g.:
| |
| ::::<big> Za ⊕ Pa = K </big> or <big> Zb ⊕ Pb = K </big>
| |
| | |
| On 31 August 1941, two long messages were received that had the same indicator HQIBPEXEZMUG. The first seven characters of these two ciphertexts were the same, but the second message was shorter. The first 15 characters of the two messages were as follows:
| |
| {| class="wikitable" | border=1 | style="margin: 1em auto 1em auto"
| |
| | align="center" | <big> Za</big> || '''<tt>JSH5N ZYZY5 GLFRG</tt>'''
| |
| |-
| |
| | align="center" | <big>Zb</big> || '''<tt>JSH5N ZYMFS /885I</tt>'''
| |
| |-
| |
| | align="center" | <big> Za ⊕ Zb</big> || '''<tt>///// //FOU GFL4M</tt>'''
| |
| |}
| |
| John Tiltman tried various likely pieces of plaintext, i.e. a [[Known-plaintext attack|"cribs"]], against the <big>Za ⊕ Zb</big> string and found that the first plaintext message started with the German word ''SPRUCHNUMMER'' (message number). In the second plaintext, the operator had used the common abbreviation ''NR'' for ''NUMMER''. There were more abbreviations in the second message, and the punctuation sometimes differed. This allowed Tiltman to work out, over ten days, the plaintext of both messages, as a sequence of plaintext characters discovered in <big>Pa</big>, could then be tried against <big>Pb</big> and ''vice versa''.<ref>{{Harvnb|Copeland|2010}}</ref> In turn, this yielded almost 4000 characters of key.<ref>{{Harvnb|Tutte|1998|p=4}}</ref>
| |
| | |
| Members of the Research Section worked on this key to try to derive a mathematical description of the key generating process, but without success. [[Bill Tutte]] joined the section in October 1941 and was given the task. He had read chemistry and mathematics at [[Trinity College, Cambridge]] before being recruited to Bletchley Park. At his training course, he had been taught the [[Kasiski examination]] technique of writing out a key on squared paper with a new row after a defined number of characters that was suspected of being the frequency of repetition of the key. If this number was correct, the columns of the matrix would show more repetitions of sequences of characters than chance alone.
| |
| | |
| Tutte knew that the Tunny indicators used 25 letters (excluding J) for 11 of the positions, but only 23 letters for the other. He therefore tried Kasiski's technique on the first two impulses of the key characters using a repetition of 25 × 23 = 575. Tutte did not observe a large number of repetitions in the columns with this period, but he did observe the phenomenon on a diagonal. He therefore tried again with 574, which showed up repeats in the columns. Recognising that the [[prime factor]]s of this number are 2, 7 and 41, he tried again with a period of 41 and "got a rectangle of dots and crosses that was replete with repetitions".<ref>{{Harvnb|Tutte|2006|p=357}}</ref>
| |
| | |
| It was clear, however, that the first impulse of the key was more complicated than that produced by a single wheel of 41 positions. Tutte called this component of the key <math>\chi</math><sub>1</sub> (''chi''). He figured that there was another component, which was XOR-ed with this, that did not always change with each new character, and that this was the product of a wheel that he called <math>\psi</math><sub>1</sub> (''psi''). The same applied for each of the five impulses—indicated here by subscripts. So for a single character, the key '''K''' consisted of two components:
| |
| :::: <big>K</big> = <big><math>\chi</math> ⊕ <math>\psi</math> </big>.
| |
| For a stream of characters, the ''psi'' component of the key stream did not change with each new character and is referred to at the ''extended psi'', symbolised by <math>\psi</math><span style="font-size:125%;">'</span>:
| |
| ::::<big>K</big> = <big><math>\chi</math> ⊕ <math>\psi</math><span style="font-size:125%;">'</span> </big>.
| |
| | |
| Tutte's derivation of the <math>\psi</math> component was made possible by the fact that dots were more likely than not to be followed by dots, and crosses more likely than not to be followed by crosses. This was a product of a weakness in the German key setting, which they later stopped. Once Tutte had made this breakthrough, the rest of the Research Section joined in to study the other impulses, and it was established that the five <math>\psi</math> wheels all moved together under the control of two <math>\mu</math> (''mu'' or "motor") wheels.
| |
| | |
| Diagnosing the functioning of the Tunny machine in this way was a truly remarkable cryptanalytical achievement.
| |
| | |
| ==Turingery==
| |
| {{see also|Turingery}}
| |
| In July 1942 Turing spent a few weeks in the Research Section.<ref>{{Harvnb|Tutte|2006|pp=359, 360}}</ref> He had become interested in the problem of breaking Tunny from the keys that had been obtained from depths.<ref name="Copeland2006P380"/> In July, he developed a method of deriving the cam settings from a length of key. It became known as "Turingery"<ref name="GRoT43B313" >{{Harvnb|Good|Michie|Timms|1945|p=313}} in ''4. Early Methods and History: Testery Methods 1942-1944''</ref> or "Turing's Method"<ref>{{Harvnb|Government Code and Cypher School|1944|p=89}}</ref> (playfully dubbed "Turingismus" by Peter Ericsson, [[Peter Hilton]] and [[Donald Michie]]<ref name="Copeland2006P380">{{Harvnb|Copeland|2006|p=380}}</ref>) and introduced the important method of "differencing" on which much of the rest of breaking Tunny messages in the absence of depths, was based.
| |
| | |
| ===Differencing===
| |
| The search was on for a process that would manipulate the ciphertext or key to produce a frequency distribution of characters that departed from the uniformity that the enciphering process aimed to achieve. Turing worked out that the XOR combination of the values of successive characters in a stream of ciphertext or key, emphasised any departures from a uniform distribution. The resultant stream was called the difference (symbolised by the Greek letter "delta" '''Δ''') because XOR is the same as modulo 2 subtraction. So, for a stream of characters '''S''', the difference '''ΔS''' was obtained as follows, where <u>underline</u> indicates the succeeding character:
| |
| | |
| ::::<big> ΔS = S ⊕ <u>S</u> </big>
| |
| | |
| The stream '''S''' may be ciphertext '''Z''', plaintext '''P''', key '''K''' or either of its two components <math>\chi</math> and <math>\psi</math>. The relationship amongst these elements still applies when they are differenced. For example, as well as:
| |
| | |
| ::::<big> K = <math>\chi</math> ⊕ <math>\psi</math> </big>
| |
| | |
| It is the case that:
| |
| ::::<big> ΔK = Δ<math>\chi</math> ⊕ Δ<math>\psi</math> </big>
| |
| | |
| Similarly for the ciphertext, plaintext and key components:
| |
| | |
| ::::<big> ΔZ = ΔP ⊕ Δ<math>\chi</math> ⊕ Δ<math>\psi</math> </big></div> </big>
| |
| | |
| So:
| |
| ::::<big> ΔP = ΔZ ⊕ Δ<math>\chi</math> ⊕ Δ<math>\psi</math> </big>
| |
| | |
| The reason that differencing provided a way into Tunny, was that although the frequency distribution of characters in the ciphertext could not be distinguished from a random stream, the same was not true for a version of the ciphertext from which the ''chi'' element of the key had been removed. This is because, where the plaintext contained a repeated character and the ''psi'' wheels did not move on, the differenced ''psi'' character ('''Δ'''<math>\psi</math>) would be the null character ('<span style="font-size:140%;">'''/'''</span> ' at Bletchley Park). When XOR-ed with any character, this character has no effect, so in these circumstances, '''Δ'''<math>\chi</math> = '''ΔK'''. The ciphertext modified by the removal of the ''chi'' component of the key was called the de-''chi'' '''D''' at Bletchley Park,<ref>{{Harvnb|Small|1944|p=2}} refers to the de-''chi'' as being "pseudo plain"</ref> and the process of removing it as "de-''chi''-ing". Similarly for the removal of the ''psi'' component which was known as "de-''psi''-ing" (or "deep sighing" when it was particularly difficult).<ref>{{Harvnb|Tutte|2006|p=365}}</ref>
| |
| | |
| So the delta de-''chi'' '''ΔD''' was:
| |
| ::::<big> ΔD = ΔZ ⊕ Δ<math>\chi</math> </big>
| |
| | |
| Repeated characters in the plaintext were more frequent both because of the characteristics of German (EE, TT, LL and SS are relatively common),<ref>{{Citation | last = Singh | first = Simon | author-link = Simon Singh | title = The Black Chamber | url = http://www.simonsingh.net/The_Black_Chamber/hintsandtips.html | accessdate = 28 April 2012 }}</ref> and because telegraphists frequently repeated the figures-shift and letters-shift characters<ref>[[Max Newman|Newman]] c. 1944 p. 387</ref> as their loss in an ordinary telegraph transmission could lead to gibberish.<ref>{{Harvnb|Carter|2004|p = 3}}</ref>
| |
| | |
| To quote the General Report on Tunny:<blockquote>Turingery introduced the principle that the key differenced at one, now called '''ΔΚ''', could yield information unobtainable from ordinary key. This '''Δ''' principle was to be the fundamental basis of nearly all statistical methods of wheel-breaking and setting.<ref name="GRoT43B313"/></blockquote>
| |
| | |
| As well as applying differencing to the full 5-bit characters of the ITA2 code, it was also applied to the individual impulses (bits).<ref>The five impulses or bits of the coded characters are sometimes referred to as five levels.</ref> So, for the first impulse, that was enciphered by wheels <math>\chi</math><sub>1</sub> and <math>\psi</math><sub>1</sub>, differenced at one:
| |
| ::::<big> ΔK<sub>1</sub> = K<sub>1</sub> ⊕ <u>K</u><sub>1</sub> </big>
| |
| And for the second impulse:
| |
| ::::<big> ΔK<sub>2</sub> = K<sub>2</sub> ⊕ <u>K</u><sub>2</sub> </big>
| |
| And so on.
| |
| | |
| It is also worth noting that the periodicity of the ''chi'' and ''psi'' wheels for each impulse (41 and 43 respectively for the first impulse) is reflected in its pattern of '''ΔK'''. However, given that the ''psi'' wheels did not advance for every input character, as did the ''chi'' wheels, it was not simply a repetition of the pattern every 41 × 43 = 1763 characters for '''ΔK'''<sub>1</sub>, but a more complex sequence.
| |
| | |
| ===Turing's method===
| |
| {{See also|Turingery}}
| |
| Turing's method of deriving the cam settings of the wheels from a length of key obtained from a depth, involved an [[Iteration|iterative]] process. Given that the delta ''psi'' character was the null character '<span style="font-size:140%;">'''/'''</span> ' half of the time on average, an assumption that '''ΔK''' = '''Δ'''<math>\chi</math> had a 50% chance of being correct. The process started by treating a particular '''ΔK''' character as being the '''Δ'''<math>\chi</math> for that position. The resulting putative bit pattern of <big> '''x''' </big> and <big> '''•''' </big> for each ''chi'' wheel, was recorded on a sheet of paper that contained as many columns as there were characters in the key, and five rows representing the five impulses of the '''Δ'''<math>\chi</math>. Given the knowledge from Tutte's work, of the periodicity of each of the wheels, this allowed the propagation of these values at the appropriate positions in the rest of the key.
| |
| | |
| A set of five sheets, one for each of the ''chi'' wheels, was also prepared. These contained a set of columns corresponding in number to the cams for the appropriate ''chi'' wheel, and were referred to as a 'cage'. So the <math>\chi</math><sub>3</sub> cage had 29 such columns.<ref>{{Harvnb|Copeland|2006|p=385}} which reproduces a <math>\chi</math><sub>3</sub> cage from the General Report on Tunny</ref> Successive 'guesses' of '''Δ'''<math>\chi</math> values then produced further putative cam state values. These might either agree or disagree with previous assumptions, and a count of agreements and disagreements was made on these sheets. Where disagreements substantially outweighed agreements, the assumption was made that the '''Δ'''<math>\psi</math> character was not the null character '<span style="font-size:140%;">'''/'''</span> ', so the relevant assumption was discounted. Progressively, all the cam settings of the ''chi'' wheels were deduced, and from them, the ''psi'' and motor wheel cam settings.
| |
| | |
| As experience of the method developed, improvements were made that allowed it to be used with much shorter lengths of key than the original 500 or so characters.<ref name="GRoT43B313"/>
| |
| | |
| ==Testery==
| |
| {{See also|Testery}}
| |
| The Testery was the section at Bletchley Park that performed the bulk of the work involved in decrypting Tunny messages.<ref name="Roberts 2009">{{Harvnb|Roberts|2009}}</ref> By July 1942, the volume of traffic was building up considerably. A new section was therefore set up, led by [[Ralph Tester]]—hence the name. The staff consisted mainly of ex-members of the Research Section,<ref>{{Harvnb|Good|Michie|Timms|1945|p=28}} in ''1. Introduction: Organisation''</ref> and included Peter Ericsson, [[Peter Hilton]], [[Denis Oswald]] and [[Jerry Roberts]].<ref>{{Harvnb|Roberts|2006|p=250}}</ref> The Testery's methods were almost entirely manual, both before and after the introduction of automated methods in the [[Newmanry]] to supplement and speed up their work.<ref name="Roberts 2009"/><ref>{{Harvnb|Good|Michie|Timms|1945|p=29}} in ''1. Introduction: Organisation''</ref>
| |
| | |
| The first phase of the work of the Testery ran from July to October, with the predominant method of decryption being based on depths and partial depths.<ref>Unlike a full depth, when all twelve letters of the indicator were the same, a partial depth occurred when one or two of the indicator letters differed.</ref> After ten days, however, the stereotyped opening of the messages was replaced by nonsensical ''quatsch'' making decryption more difficult. This period was a productive time, albeit each decryption took considerable time until, in September, a depth was received that allowed Turing's method of wheel breaking "[[#Turingery|Turingery]]" to be used, and current traffic started to be read. Extensive data about the statistical characteristics of the language of the messages was compiled, and the collection of cribs extended.<ref name="GRoT43B313"/>
| |
| | |
| In late October 1942 the original, experimental Tunny link was closed and two new links (Codfish and Octopus) were opened. With these and subsequent links, the 12-letter indicator system of specifying the message key was replaced by the QEP system. This meant that only full depths could be recognised—from identical QEP numbers—which led to a considerable reduction in traffic decrypted.
| |
| | |
| Once the Newmanry became operational in June 1943, the nature of the work performed in the Testery changed, with decrypts, and wheel breaking no longer relying on depths.
| |
| | |
| ===British Tunny===
| |
| [[File:British Tunny Rebuild.JPG|right|thumbnail|280px|A rebuilt British Tunny at [[the National Museum of Computing]], [[Bletchley Park]]. It imitated the functions of the Lorenz SZ40/42, producing printed cleartext from a ciphertext input tape.]]
| |
| | |
| The so-called "British Tunny Machine" was a device that exactly replicated the functions of the SZ40/42 machines.<ref name="WardBritishTunny"/> It was used to produce the German cleartext from a ciphertext tape, after the cam settings had been determined.<ref>{{Harvnb|Hayward|1993|pp=175–192}}</ref> The functional design was produced at Bletchley Park where ten Testery Tunnies were in use by the end of the war. It was designed and built in [[Tommy Flowers|Tommy Flowers']] laboratory at the [[Post Office Research Station|General Post Office Research Station]] at Dollis Hill by Gil Hayward, [[Allen Coombs|"Doc" Coombs]], Bill Chandler and Sid Broadhurst.<ref>{{Harvnb|Hayward|2006|p=291}}</ref> It was mainly built from standard British telephone exchange [[electro-mechanical]] equipment such as [[relay]]s and [[Stepping switch|uniselectors]]. Input and output was by means of a teleprinter with paper tape reading and punching.<ref>{{Harvnb|Currie|2006|pp=265–266}}</ref> These machines were used in both the [[#Testery|Testery]] and later the [[#Newmanry|Newmanry]]. Dorothy Du Boisson who was a machine operator and a member of the [[Women's Royal Naval Service]] (Wren), described plugging up the settings as being like operating an old fashioned telephone exchange and that she received electric shocks in the process.<ref>{{Harvnb|Copeland|2006|p=162}} quoting Dorothy Du Boisson</ref>
| |
| | |
| When Flowers was invited by Hayward to try the first British Tunny machine at Dollis Hill by typing in the standard test phrase: "Now is the time for all good men to come to the aid of the party", he much appreciated that the rotor functions had been set up to provide the following [[William Wordsworth|Wordsworthian]] output:<ref>{{Harvnb|Hayward|2006|p=292}}</ref>
| |
| | |
| {| class="wikitable" | border=1 | style="margin: 1em auto 1em auto"
| |
| | align="center" | <small>Input</small> || '''<tt>NOW IS THE TIME FOR ALL GOOD MEN TO COME TO THE AID OF THE PARTY</tt>'''
| |
| |-
| |
| | align="center" | <small>Output</small> || '''<tt>I WANDERED LONELY AS A CLOUD THAT FLOATS ON HIGH OER VALES AND H</tt>'''
| |
| |}
| |
| | |
| Additional features were added to the British Tunnies to simplify their operation. Further refinements were made for the versions used in the Newmanry.<ref>{{Harvnb|Good|Michie|Timms|1945|pp=376–379}} in ''56. Copying Machines''</ref>
| |
| | |
| ==Newmanry==
| |
| The [[Newmanry]] was a section set up under [[Max Newman]] in December 1942 to look into the possibility of assisting the work of the Testery by automating parts of the processes of decrypting Tunny messages. Newman had been working with Gerry Morgan, head of the Research Section on ways of breaking Tunny when Bill Tutte approached them in November 1942 with the idea of what became known as the "1+2 break in".<ref name="GRoT-P33">{{Harvnb|Good|Michie|Timms|1945|p=33}} in ''1. Introduction: Some historical notes''</ref> This was recognised as being feasible, but only if automated.
| |
| | |
| Newman produced a functional specification of what was to become "[[#Robinsons|Heath Robinson]]".<ref name="GRoT-P33"/> He recruited the [[Post Office Research Station]] at Dollis Hill, and [[C. E. Wynn-Williams|Dr C.E. Wynn-Williams]] at the [[Telecommunications Research Establishment]] (TRE) at Malvern to implement his idea. Work on the engineering design started in January 1943 and the first machine was delivered in June. The staff at that time consisted of Newman, [[Donald Michie]], [[I. J. Good|Jack Good]], two engineers and 16 Wrens. By the end of the war the Newmanry contained three Robinson machines, ten Colossus Computers and a number of British Tunnies.<ref>{{Harvnb|Good|Michie|Timms|1945|p=276}} in ''3. Organisation: Mr Newman's Section''</ref> The staff were 26 cryptographers, 28 engineers and 275 Wrens.<ref>{{Harvnb|Copeland|2006|p=158}}</ref>
| |
| | |
| The automation of these processes required the processing of large quantities of punched paper tape such as those on which the enciphered messages were received. Absolute accuracy of these tapes and their transcription was essential, as a single character in error could invalidate or corrupt a huge amount of work. Jack Good introduced the maxim "If it's not checked it's wrong".<ref>{{Harvnb|Good|2006|p=215}}</ref>
| |
| | |
| ===Tutte's "1+2 break in"===
| |
| The essence of this method was to find the initial settings of the ''chi'' component of the key by exhaustively trying all positions of its combination with the ciphertext, and looking for evidence of the non-uniformity that reflected the characteristics of the original plaintext.<ref>{{Harvnb|Good|Michie|Timms|1945|pp=321–322}} in ''44. Hand Statistical Methods: Setting - Statistical Methods''</ref><ref>{{Harvnb|Budiansky|2006|pp=58–59}}</ref> The wheel breaking process had to have successfully produced the current cam settings to allow the relevant sequence of characters of the ''chi'' wheels to be generated. It was totally impracticable to generate the 22 million characters from all five of the ''chi'' wheels, so it was initially limited to 41 × 31 = 1271 from the first two.
| |
| | |
| Given that for each of the five impulses ''i'':
| |
| ::::<big>Z<sub>i</sub> = <math>\chi</math><sub>i</sub> ⊕ <math>\psi</math><sub>i</sub> ⊕ P<sub>i</sub></big>
| |
| and hence
| |
| ::::<big>P<sub>i</sub> = Z<sub>i</sub> ⊕ <math>\chi</math><sub>i</sub> ⊕ <math>\psi</math><sub>i</sub></big>
| |
| for the first two impulses:
| |
| ::::<big>(P<sub>1</sub> ⊕ P<sub>2</sub>) = (Z<sub>1</sub> ⊕ Z<sub>2</sub>) ⊕ (<math>\chi</math><sub>1</sub> ⊕ <math>\chi</math><sub>2</sub>) ⊕ (<math>\psi</math><sub>1</sub> ⊕ <math>\psi</math><sub>2</sub>)</big>
| |
| Calculating a putative <big>P<sub>1</sub> ⊕ P<sub>2</sub></big> in this way for each starting point of the <big><math>\chi</math><sub>1</sub> ⊕ <math>\chi</math><sub>2</sub></big> sequence would yield '''x'''s and '''•'''s with, in the long run, a greater proportion of '''•'''s when the correct starting point had been used. Tutte knew, however, that using the [[#Differencing|differenced]] (∆) values amplified this effect<ref>For this reason Tutte's 1 + 2 method is sometimes called the "double delta" method.</ref> because any repeated characters in the plaintext would always generate '''•''', and similarly ∆<math>\psi</math><sub>1</sub> ⊕ ∆<math>\psi</math><sub>2</sub> would generate '''•''' whenever the ''psi'' wheels did not move on, and about half of the time when they did - some 70% overall.
| |
| | |
| Tutte analyzed a decrypted ciphertext with the differenced version of the above function:
| |
| ::::<big>(∆Z<sub>1</sub> ⊕ ∆Z<sub>2</sub>) ⊕ (∆<math>\chi</math><sub>1</sub> ⊕ ∆<math>\chi</math><sub>2</sub>) ⊕ (∆<math>\psi</math><sub>1</sub> ⊕ ∆<math>\psi</math><sub>2</sub>)</big>
| |
| and found that it generated '''•''' some 55% of the time.<ref>{{Harvnb|Tutte|2006|p=364}}</ref> Given the nature of the contribution of the ''psi'' wheels, the alignment of ''chi''-stream with the ciphertext that gave the highest count of '''•'''s from <big>(∆Z<sub>1</sub> ⊕ ∆Z<sub>2</sub> ⊕ ∆<math>\chi</math><sub>1</sub> ⊕ ∆<math>\chi</math><sub>2</sub>)</big> was the one that was most likely to be correct.<ref>{{Harvnb|Carter|2004|pp=4–6}}</ref> This technique could be applied to any pair of impulses and so provided the basis of an automated approach to obtaining the de-''chi'' (D) of a ciphertext, from which the ''psi'' component could be removed by manual methods.
| |
| | |
| ===Robinsons===
| |
| {{Main|Heath Robinson (codebreaking machine)}}
| |
| [[Heath Robinson (codebreaking machine)|Heath Robinson]] was the first machine produced to automate Tutte's 1+2 method. It was given the name by the [[Women's Royal Naval Service|Wrens]] who operated it, after cartoonist [[William Heath Robinson]], who drew immensely complicated mechanical devices for simple tasks, similar to [[Rube Goldberg]] in the USA.
| |
| | |
| The functional specification of the machine was produced by Max Newman. The main engineering design was the work of Frank Morrell<ref>{{Citation | title = Bletchley Park National Code Centre: November 1943 | url = http://www.bletchleypark.org.uk/content/archive/nov1943.rhtm | accessdate = 21 November 2012 }}</ref> at the [[Post Office Research Station]] at Dollis Hill in North London, with his colleague Tommy Flowers designing the "Combining Unit".<ref name="GRoT-P33"/> Dr [[C. E. Wynn-Williams]] from the [[Telecommunications Research Establishment]] at Malvern produced the high-speed electronic valve and relay counters.<ref name="GRoT-P33"/> Construction started in January 1943,<ref>{{Harvnb|Copeland|2006|p=65}}</ref> the prototype machine was delivered to Bletchley Park in June and was first used to help read current encrypted traffic soon afterwards.<ref>{{Harvnb|Good|Michie|Timms|1945|p=290}} in ''3. Organisation: Machine Setting Organisation''</ref>
| |
| The main parts of the machine were:
| |
| * a tape transport and reading mechanism (dubbed the "bedstead" because of its resemblance to an upended metal bed frame) that ran the looped key and message tapes at between 1000 and 2000 characters per second;
| |
| * a combining unit that implemented the logic of Tutte's method;
| |
| * a counting unit that counted the number of '''•'''s, and if it exceeded a pre-set total, displayed or printed it.
| |
| | |
| The prototype machine and was effective despite a number of serious shortcomings.<ref>{{Harvnb|Good|Michie|Timms|1945|p=328}} in ''52. Development of Robinson and Colossus''</ref> Most of these were progressively overcome in the development of what became known as "Old Robinson".<ref>{{Harvnb|Good|Michie|Timms|1945|p=354}} in ''54. Robinson: Introduction''</ref> A later development was a machine called "Super Robinson".<ref>{{Harvnb|Good|Michie|Timms|1945|pp=354–362}} in ''54. Robinson''</ref>
| |
| | |
| ===Colossus===
| |
| {{Main|Colossus computer}}
| |
| [[File:Colossus.jpg|right|thumbnail|320px|A Mark 2 Colossus computer. The Wren operators are (left to right) Dorothy Du Boisson and Elsie Booker. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The "bedstead" paper tape transport is on the right.]]
| |
| [[Image:ColossusRebuild 11.jpg|right|thumbnail|320px|In 1994, a team led by [[Anthony Sale|Tony Sale]] (right) began a reconstruction of a Mark 2 Colossus at Bletchley Park. Here, in 2006, Sale and Phil Hayes supervise the breaking of an enciphered message with the completed machine.]]
| |
| | |
| Tommy Flowers' experience with Heath Robinson, and his previous, unique experience of [[Vacuum tube|thermionic valves (vacuum tubes)]] led him to realize that a better machine could be produced using electronics. Instead of the key stream being read from a punched paper tape, an electronically generated key stream could allow much faster and more flexible processing. Flowers' suggestion that this could be achieved with a machine that was entirely electronic and would contain between one and two thousand valves, was treated with incredulity at both the Telecommunications Research Establishment and at Bletchley Park, as it was thought that it would be "too unreliable to do useful work". He did, however, have the support of the Controller of Research at Dollis Hill, W Gordon Radley,<ref>{{Harvnb|Fensom|2006|pp=300–301}}</ref> and he implemented these ideas producing [[Colossus computer|Colossus]], the world's first electronic, digital, computing machine that was at all programmable, in the remarkably short time of ten months.<ref>{{Harvnb|Flowers|2006|p=80}}</ref> In this he was assisted by his colleagues at the [[Post Office Research Station]] [[Dollis Hill]]: Sidney Broadhurst, William Chandler, [[Allen Coombs]] and Harry Fensom.
| |
| | |
| The main parts of the machine were:
| |
| * a tape transport and reading mechanism (the "bedstead") that ran the message tape in a loop at 5000 characters per second;
| |
| * a unit that generated the key stream electronically;
| |
| * a combining unit that implemented the logic of Tutte's method;
| |
| * a counting unit that counted the number of '''•'''s, and if it exceeded a pre-set total, printed it out.
| |
| | |
| The prototype Mark 1 Colossus (Colossus I), with its 1500 valves, was shown to be working at Dollis Hill in December 1943 and was operational at Bletchley Park by February 1944. This processed the message at 5000 characters per second using the impulse from reading the tape's sprocket holes to act as the [[clock signal]]. It quickly became evident that this was a huge leap forward in cryptanalysis of Tunny. Further Colossus machines were ordered and the orders for more Robinsons cancelled.
| |
| | |
| An improved Mark 2 Colossus (Colossus II) contained 2400 valves and first worked at Bletchley Park on 1 June 1944, just in time for the [[Normandy Landings|D-day Normandy landings]]. This processed the message at an effective speed of 25,000 characters per second by the use of circuitry invented by Flowers that would now be called a [[shift register]]. Donald Michie worked out a method of using Colossus to assist in wheel breaking as well as for wheel setting.<ref>{{Harvnb|Good|Michie|1992}}</ref> This was then implemented in special hardware on later Colossi.
| |
| | |
| A total of ten Colossus computers were in use by the end of the war.
| |
| | |
| ==Special machines==
| |
| As well as the commercially produced teleprinters and re-perforators, a number of other machines were built to assist in the preparation and checking of tapes in the Newmanry and Testery. The approximate complement as at May 1945 was as follows.<ref>{{Harvnb|Good|Michie|Timms|1945|pp=25–27, 367–379}} in ''1. Introduction: Machines'' and ''52. Development of Robinson and Colossus: Copying Machines''</ref>
| |
| {| class="wikitable" | border=1 | style="margin: 1em auto 1em auto"
| |
| |+ Machines used in deciphering Tunny as at May 1945
| |
| |-
| |
| ! width="100pt" | Name
| |
| ! width="450pt"| Function
| |
| ! Testery
| |
| ! Newmanry
| |
| |-
| |
| | Super Robinson|| Used for crib runs in which two tapes were compared in all positions. Contained some valves. || || align="center" | 2
| |
| |-
| |
| | Colossus Mk.2 || Counted a condition involving a message tape and an electronically-generated key character stream imitating the various Tunny wheels in different relative positions ("stepping").<ref>{{Harvnb|Good|Michie|Timms|1945|p=333}} in ''53. Colossus''</ref> Contained some 2,400 valves. || || align="center" | 10
| |
| |-
| |
| | Dragons || Used for setting short [[Known-plaintext attack|crib]]s by "crib-dragging" (hence the name).<ref>{{Harvnb|Hayward|2006|pp=291–292}}</ref><ref>{{Harvnb|Michie|2006|p=236}}</ref> || || align="center" | 2
| |
| |-
| |
| | Aquarius || A machine under development at the war's end for the "go-backs" of the SZ42B, which stored the contents of the message tape in a large bank of [[capacitor]]s that acted as an electronic memory.<ref>{{Harvnb|Fensom|2006|pp=301–302}}</ref> || || align="center" | 1
| |
| |-
| |
| | Proteus || A machine for utilising [[Cryptanalysis#Depth|depths]] that was under construction at the war's end but was not completed. || ||
| |
| |-
| |
| | Decoding Machines || Translated from cipertext typed in, to plaintext printed out. Some of the later ones were speeded up with the use of a few valves.<ref>{{Harvnb|Good|Michie|Timms|1945|pp=326}} in ''5. Specialise Counting Machines''</ref> A number of modified machines were produced for the Newmanry || align="center" | ? || align="center" | 13
| |
| |-
| |
| | Tunnies || See [[#British Tunny|British Tunny]] above || align="center" | 3 || align="center" | ?
| |
| |-
| |
| | Miles || A set of increasingly complex machines (A, B, C, D) that read two tapes and combined them in a variety of ways to produce an output tape. || align="center" | 3 ||
| |
| |-
| |
| | Garbo || Similar to Junior, but with a [[#Differencing|Delta'ing]] facility. || align="center" | 3 ||
| |
| |-
| |
| | Juniors || For printing tapes ''via'' a plug panel to change characters as necessary. || align="center" | 4 ||
| |
| |-
| |
| | Insert machines || Similar to Angel, but with a device for making corrections by hand. || align="center" | 2 ||
| |
| |-
| |
| | Angels || Copied tapes. || align="center" | 4 ||
| |
| |-
| |
| | Hand perforators || Generated tape from a keyboard. || align="center" | 2 ||
| |
| |-
| |
| | Hand counters || Measured text length. || align="center" | 6 ||
| |
| |-
| |
| | Stickers (hot) || [[Bostick]] and [[Petroleum ether|benzene]] was used for sticking tapes to make a loop. The tape to be stuck was inserted between two electrically heated plates and the benzene evaporated. || align="center" | 3 ||
| |
| |-
| |
| | Stickers (cold) || Stuck tapes without heating. || align="center" | 6 ||
| |
| |}
| |
| | |
| ==Steps in Wheel Setting==
| |
| Working out the start position of the ''chi'' (<math>\chi</math>) wheels required first that their cam settings had been determined by "wheel breaking". Initially, this was achieved by two messages having been sent in [[Cryptanalysis#Depth|depth]].
| |
| | |
| The number of start positions for the first two wheels, <math>\chi</math><sub>1</sub> and <math>\chi</math><sub>2</sub> was 41×31 = 1271. The first step was to try all of these start positions against the message tape. This was [[Cryptanalysis of the Lorenz cipher#Tutte's "1+2 break in"|Tutte's "1+2 break in"]] which involved computing <big>(∆Z<sub>1</sub> ⊕ ∆Z<sub>2</sub> ⊕ ∆<math>\chi</math><sub>1</sub> ⊕ ∆<math>\chi</math><sub>2</sub>)</big>–which gives a putative (<big>∆D<sub>1</sub> ⊕ ∆D<sub>2</sub></big>)–and counting the number of times this gave '''•'''. Both Heath Robinson, which was developed into what became known as "Old Robinson", and Colossus were designed to automate this process. Statistical theory allowed the derivation of measures of how far any count was from the random situation expected with an incorrect starting point for the ''chi'' wheels. For this step, the measure of deviation from randomness was called sigma. Starting points that gave a count of less than 2.5 × sigma, named the "set total", were not printed out.<ref>{{Harvnb|Small|1944|p=9}}</ref> In the ideal case there was a single large value for sigma that identified the start positions of <math>\chi</math><sub>1</sub> and <math>\chi</math><sub>2</sub>. An example of the output from such a run on a Mark 2 Colossus with its five counters: a,b,c,d and e, is given below.
| |
| {| class="wikitable" | border=1 | style="margin: 1em auto 1em auto"
| |
| |+ Output table abridged from Small's "The Special Fish Report".<ref>{{Harvnb|Small|1944|p=19}}</ref> The set total threshold was 4912.
| |
| |-
| |
| ! <math>\chi</math><sub>1</sub>
| |
| ! <math>\chi</math><sub>2</sub>
| |
| ! Counter letter
| |
| ! Count
| |
| ! Operator's notes on the output
| |
| |-
| |
| | 06 || 11 || align="center" | a || 4021 ||
| |
| |-
| |
| | 06 || 13 || align="center" | a || 4948 ||
| |
| |-
| |
| | 02 || 16 || align="center" | e || 4977 ||
| |
| |-
| |
| | 05 || 18 || align="center" | b || 4926 ||
| |
| |-
| |
| | 02 || 20 || align="center" | e || 4954 ||
| |
| |-
| |
| | 05 || 22 || align="center" | b || 4914 ||
| |
| |-
| |
| | 03 || 25 || align="center" | d || 4925 ||
| |
| |-
| |
| | 02 || 26 || align="center" | e || 5015 || ← 4.6 sigma
| |
| |-
| |
| | 19 || 26 || align="center" | c || 4928 ||
| |
| |-
| |
| | 25 || 19 || align="center" | b || 4930 ||
| |
| |-
| |
| | 25 || 21 || align="center" | b || 5038 || ← 5.1 sigma
| |
| |-
| |
| | 29 || 18 || align="center" | c || 4946 ||
| |
| |-
| |
| | 36 || 13 || align="center" | a || 4955 ||
| |
| |-
| |
| | 35 || 18 || align="center" | b || 4926 ||
| |
| |-
| |
| | 36 || 21 || align="center" | a || 5384 || ← 12.2 sigma ch <math>\chi</math><sub>1</sub> <math>\chi</math><sub>2</sub> ! !
| |
| |-
| |
| | 36 || 25 || align="center" | a || 4965 ||
| |
| |-
| |
| | 36 || 29 || align="center" | a || 5013 ||
| |
| |-
| |
| | 38 || 08 || align="center" | d || 4933 ||
| |
| |-
| |
| |}
| |
| | |
| Having identified possible <math>\chi</math><sub>1</sub> <math>\chi</math><sub>2</sub> start positions, the next step was to try to find the start positions for the other ''chi'' wheels. In the example given above, there is a single setting of <math>\chi</math><sub>1</sub> = 36 and <math>\chi</math><sub>2</sub> = 21 whose sigma value makes it stand out from the rest. This was not always the case and there were many different actions that could be taken. Small enumerates 36 different further runs that might be done.<ref>{{Harvnb|Small|1944|p=7}}</ref> At first the choice was made by the cryptanalyst sitting at the typewriter output, and calling out instructions to the Wren operators. Max Newman devised a decision tree and then set Jack Good and Donald Michie the task of devising others. These were used by the Wrens without recourse to the cryptanalysts if certain criteria were met.<ref>{{Harvnb|Good|2006|p=218}}</ref>
| |
| | |
| In the above one of Small's examples, the next run was with the first two ''chi'' wheels set to the start positions found and three separate parallel explorations of the remaining three ''chi'' wheels.
| |
| | |
| {| class="wikitable" | border=1 | style="margin: 1em auto 1em auto"
| |
| |+ Output table adapted from Small's "The Special Fish Report".<ref>{{Harvnb|Small|1944|p=20}}</ref> The set total threshold was 2728.
| |
| |-
| |
| ! <math>\chi</math><sub>1</sub>
| |
| ! <math>\chi</math><sub>2</sub>
| |
| ! <math>\chi</math><sub>3</sub>
| |
| ! <math>\chi</math><sub>4</sub>
| |
| ! <math>\chi</math><sub>5</sub>
| |
| ! Counter letter
| |
| ! Count
| |
| ! Operator's notes on the output
| |
| |-
| |
| | 36 || 21 || 01 || || || align="center" | a || 2938 || ← 6.8 rho ! <math>\chi</math><sub>3</sub> !
| |
| |-
| |
| | 36 || 21 || || 01 || || align="center" | b || 2763 ||
| |
| |-
| |
| | 36 || 21 || || || 01 || align="center" | c || 2803 ||
| |
| |-
| |
| | 36 || 21 || || 02 || || align="center" | b || 2733 ||
| |
| |-
| |
| | 36 || 21 || || || 04 || align="center" | c || 3003 || ← 8.6 rho ! <math>\chi</math><sub>5</sub> !
| |
| |-
| |
| | 36 || 21 || 06 || || || align="center" | a || 2740 ||
| |
| |-
| |
| | 36 || 21 || || || 07 || align="center" | c || 2750 ||
| |
| |-
| |
| | 36 || 21 || || 09 || || align="center" | b || 2811 ||
| |
| |-
| |
| | 36 || 21 || 11 || || || align="center" | a || 2751 ||
| |
| |-
| |
| | 36 || 21 || || || 12 || align="center" | c || 2759 ||
| |
| |-
| |
| | 36 || 21 || || || 14 || align="center" | c || 2733 ||
| |
| |-
| |
| | 36 || 21 || 16 || || || align="center" | a || 2743 ||
| |
| |-
| |
| | 36 || 21 || || 19 || || align="center" | b || 3093 || ← 11.1 rho ! <math>\chi</math><sub>4</sub> !
| |
| |-
| |
| | 36 || 21 || 20 || || || align="center" | a || 2785 ||
| |
| |-
| |
| | 36 || 21 || || 22 || || align="center" | b || 2823 ||
| |
| |-
| |
| | 36 || 21 || 24 || || || align="center" | a || 2740 ||
| |
| |-
| |
| | 36 || 21 || || 25 || || align="center" | b || 2796 ||
| |
| |-
| |
| | 36 || 21 || || 01 || || align="center" | b || 2763 ||
| |
| |-
| |
| | 36 || 21 || || || 07 || align="center" | c || 2750 ||
| |
| |-
| |
| |}
| |
| | |
| Once the probable start positions for the ''chi'' wheels had been derived, they had to be verified before the de-''chi'' (<big>D</big>) message was passed to the Testery. This involved performing a count of the frequency of the characters in <big>∆D</big>. Small describes the check of the frequency count of the <big>∆D</big> characters as being the "acid test",<ref>{{Harvnb|Small|1944|p=15}}</ref> and that practically every cryptanalyst and Wren in the Newmanry and Testery knew the contents of the following table by heart.
| |
| | |
| {| class="wikitable" | border=1 | style="margin: 1em auto 1em auto"
| |
| |+ Relative frequency count of characters in <big>∆D</big>.<ref>Adapted from {{Harvnb|Small|1944|p=5}}</ref>
| |
| |-
| |
| ! Char.
| |
| ! Count
| |
| ! width="25pt"|
| |
| ! Char.
| |
| ! Count
| |
| ! width="25pt"|
| |
| ! Char.
| |
| ! Count
| |
| ! width="25pt"|
| |
| ! Char.
| |
| ! Count
| |
| |-
| |
| | / || 1.28 |||| R || 0.92 |||| A || 0.96 |||| D || 0.89
| |
| |-
| |
| | 9 || 1.10 |||| C || 0.90 |||| U || 1.24 |||| F || 1.00
| |
| |-
| |
| | H || 1.02 |||| V || 0.94 |||| Q || 1.01 |||| X || 0.87
| |
| |-
| |
| | T || 0.99 |||| G || 1.00 |||| W || 0.89 |||| B || 0.82
| |
| |-
| |
| | O || 1.04 |||| L || 0.92 |||| 5 || 1.43 |||| Z || 0.89
| |
| |-
| |
| | M || 1.00 |||| P || 0.96 |||| 8 || 1.12 |||| Y || 0.97
| |
| |-
| |
| | N || 1.00 |||| I || 0.96 |||| K || 0.89 |||| S || 1.04
| |
| |-
| |
| | 3 || 1.13 |||| 4 || 0.90 |||| J || 1.03 |||| E || 0.89
| |
| |}
| |
| | |
| If the derived start points of the ''chi'' wheels passed this test, the de-''chi''-ed message was passed to the Testery where manual methods were used to derive the ''psi'' and motor settings. As Small remarked, the work in the Newmanry took a great amount of statistical science, whereas that in the Testery took much knowledge of language and was of great interest as an art. Jerry Roberts makes the point that this Testery work was a greater load on staff than the automated processes in the Newmanry.<ref name="Roberts 2009"/>
| |
| | |
| ==References and Notes==
| |
| {{reflist}}
| |
| | |
| ==Bibliography==
| |
| * {{Citation | last = BBC Timewatch | title = Code Breakers: Bletchley Park's lost Heroes | year = 2011 | url = http://www.youtube.com/watch?v=JF48sl15OCg | format = video }}
| |
| * {{Citation | last = Budiansky | first = Stephen | author-link = Stephen Budiansky | title = Colossus, Codebreaking, and the Digital Age | year = 2006 }} in {{Harvnb|Copeland|2006|pp=52–63}}
| |
| * {{Citation | last = Carter | first = Frank | title = Colossus and the Breaking of the Lorenz Cipher | publisher = Bletchley Park National Codes Centre | series = Technical Papers | url = http://www.bletchleypark.org.uk/content/lorenzcipher.pdf | year = 2004 | accessdate = 26 September 2012 }}
| |
| * {{Citation | last = Churchhouse | first = Robert | title = Codes and Ciphers: Julius Caesar, the Enigma and the Internet | place = Cambridge | publisher = Cambridge University Press | year = 2002 | isbn = 978-0-521-00890-7 }}
| |
| * {{Citation | editor-last = Copeland | editor-first = B. Jack | editor-link = Jack Copeland | title = Colossus: The Secrets of Bletchley Park's Codebreaking Computers | place = Oxford | publisher = Oxford University Press | year = 2006 | isbn = 978-0-19-284055-4 }}
| |
| * {{Citation | last = Copeland | first = B. Jack | author-link = Jack Copeland | title = Colossus: Breaking the German ‘Tunny’ Code at Bletchley Park. An Illustrated History | journal = The Rutherford Journal | volume = 3 | year = 2010 }}
| |
| * {{Citation | last = Currie| first = Helen| title = An ATS girl in the Testery }} in {{Harvnb|Copeland|2006|pp=264–268}}
| |
| * {{Citation | last = Edgerley | first = Peter | title = The Testery and the Breaking of Fish }} in {{Harvnb|Copeland|2006|pp=269–277}}
| |
| * {{Citation | editor-last = Erskine | editor-first = Ralph | editor2-last = Smith | editor2-first = Michael | editor2-link = Michael Smith (newspaper reporter) | title = The Bletchley Park Codebreakers | publisher = Biteback Publishing Ltd | origyear = 2001 | year = 2011 | isbn = 978-1-84954-078-0}} Updated and extended version of ''Action This Day: From Breaking of the Enigma Code to the Birth of the Modern Computer'' Bantam Press 2001
| |
| * {{Citation | last = Fensom | first = Harry | title = How Colossus was built and Operated | year = 2006 }} in {{Harvnb|Copeland|2006|pp=297–304}}
| |
| * {{Citation | last = Flowers | first = Thomas H. | author-link = Tommy Flowers | title = D-Day at Bletchley ''and'' Colossus | year = 2006 }} in {{Harvnb|Copeland|2006|pp=78–83, 91–100}}
| |
| * {{Citation | last = Gannon | first = Paul | title = Colossus: Bletchley Park's Greatest Secret | year = 2007 | origyear = 2006 | publisher = Atlantic Books | isbn = 978-1-84354-331-2 }}
| |
| * {{Citation | last = Good | first = Jack | author-link = I. J. Good | last2 = Michie | first2 = Donald | author2-link = Donald Michie | last3 = Timms | first3 = Geoffrey | title = General Report on Tunny: With Emphasis on Statistical Methods | year = 1945 | id = UK Public Record Office HW 25/4 and HW 25/5 | url = http://www.alanturing.net/turing_archive/archive/index/tunnyreportindex.html | accessdate = 15 September 2010 }} That version is a facsimile copy, but there is a transcript of much of this document in '.pdf' format at: {{Citation | last = Sale | first = Tony | author-link = Anthony Sale | title = Part of the "General Report on Tunny", the Newmanry History, formatted by Tony Sale| year = 2001 | url = http://www.codesandciphers.org.uk/documents/newman/newman.pdf | accessdate = 20 September 2010 }}, and a web transcript of Part 1 at: {{Citation | last = Ellsbury | first = Graham | title = General Report on Tunny With Emphasis on Statistical Methods | url = http://www.ellsbury.com/tunny/tunny-001.htm | accessdate = 3 November 2010 }}
| |
| * {{Citation | last = Good | first = Jack | author-link = I. J. Good | last2 = Michie | first2 = Donald | author2-link = Donald Michie | title = I J Good and Donald Michie in conversation with David Kahn and Karen Frrankel | publisher = Computer History Museum | publication-date = 22 June 2012 | year = 1992 | url = http://www.youtube.com/watch?feature=endscreen&NR=1&v=6p3mhkNgRXs | accessdate = 19 April 2013 }}
| |
| * {{Citation | last = Good | first = Jack | author-link = I. J. Good | title = Enigma and Fish | year = 1993 }} in {{Harvnb|Hinsley|Stripp|1993|pp=149–166 }}
| |
| * {{Citation | last = Good | first = Jack | author-link = I. J. Good | title = From Hut 8 to the Newmanry | year = 2006 }} in {{Harvnb|Copeland|2006|pp=204–222}}
| |
| * {{Citation | last = Government Code and Cypher School | author-link = Government Code and Cypher School | title = The Bletchley Park 1944 Cryptographic Dictionary formatted by Tony Sale | year = 1944 | url = http://www.codesandciphers.org.uk/documents/cryptdict/cryptxp3.pdf | accessdate = 7 October 2010 }}
| |
| * {{Citation | last = Hayward | first = Gil | title = Operation Tunny | year = 1993 }} in {{Harvnb|Hinsley|Stripp|1993|pp = 175–192}}
| |
| * {{Citation | last = Hayward | first = Gil | title = The British Tunny Machine | year = 2006 }} in {{Harvnb|Copeland|2006|pp=291–296}}
| |
| * {{Citation | editor-last = Hinsley | editor-first = F.H. | editor-link = Harry Hinsley | editor2-last = Stripp | editor2-first = Alan | year = 1993 | origyear = 1992 | title = Codebreakers: The inside story of Bletchley Park | publication-place = Oxford | publisher = Oxford University Press | isbn = 978-0-19-280132-6 }}
| |
| * {{Citation | last = Hinsley | first = F.H. | author-link = Harry Hinsley | year = 1993 | contribution = Introduction: The influence of Ultra in the Second World War }} in {{Harvnb|Hinsley|Stripp|1993|pp=1–13}}
| |
| * {{Citation | last = McKay | first = Sinclair | title = The Secret Life of Bletchley Park: The WWII Codebreaking Centre and the men and women who worked there | place = London | publisher = Aurum Press | year = 2010 | isbn = 978 1 84513 539 3 }}
| |
| * {{Citation | last = Michie | first = Donald | author-link = Donald Michie | title = Codebreaking and Colossus | year = 2006 }} in {{Harvnb|Copeland|2006|pp=223–246}}
| |
| * {{Citation | last = Newman | first = Max | author-link = Max Newman | year = c. 1944 | title = Appendix 7: Δ<math>\chi</math>-Method }} in {{Harvnb|Copeland|2006|pp=386–390}}
| |
| * {{Citation | last = Roberts | first = Jerry | author-link = Jerry Roberts | contribution = Major Tester's Section | title = Colossus: The Secrets of Bletchley Park's Codebreaking Computers | year = 2006 }} in {{Harvnb|Copeland|2006|pp=249–259}}
| |
| * {{Citation | last = Roberts | first = Jerry | author-link = Jerry Roberts | year = 2009 | title = My Top-Secret Codebreaking During World War II: The Last British Survivor of Bletchley Park’s Testery | url = http://www.ucl.ac.uk/news/news-articles/0903/09031601 | type = video | publisher = University College London | format = iTunes U }}
| |
| * {{Citation | last = Small | first = Albert W. | title = The Special Fish Report | location = The American National Archive (NARA) College Campus Washington | date = December 1944 | year = 1944 | url = http://www.codesandciphers.org.uk/documents/small/smallix.htm | accessdate = 7 March 2013}}
| |
| * {{Citation | last = Tutte | first = William T. | authorlink = W. T. Tutte | year = 2006 | title = Appendix 4: My Work at Bletchley Park }} in {{Harvnb|Copeland|2006|pp=352–369}}
| |
| * {{Citation | last = Tutte | first = W. T. | author-link = W. T. Tutte | title = Fish and I | date = 19 June 1998 | url = http://www.usna.edu/Users/math/wdj/_files/documents/papers/cryptoday/tutte_fish.pdf | accessdate = 7 April 2012 }} Transcript of a lecture given by Prof. Tutte at the [[University of Waterloo]]
| |
| * {{Citation | last = Ward | first = Mark | title = Code-cracking machine returned to life | publisher = BBC News | year = 2011 | url = http://www.bbc.co.uk/news/technology-13566878 | accessdate = 28 April 2013 }}
| |
| * {{Citation | last = Weierud | first = Frode | title = Bletchley Park's Sturgeon—The Fish That Laid No Eggs | year = 2006}} in {{Harvnb|Copeland|2006|pp=307–327}}
| |
| * {{Citation | last = Wylie | first = Shaun | author-link = Shaun Wylie | title = Breaking Tunny and the birth of Colossus | year = 2001 }} in {{Harvnb|Erskine|Smith|2011|pp=283–304}}
| |
| | |
| [[Category:Articles created via the Article Wizard]]
| |
| [[Category:History of cryptography]]
| |
| [[Category:Signals intelligence of World War II]]
| |
| [[Category:Bletchley Park]]
| |